Solved

java and SSL with Tomcat - Keystore was tampered with, or password was incorrect

Posted on 2004-10-04
3
3,200 Views
Last Modified: 2013-11-24
Hi,

I've just created all key store and certificates for ssl with tomcat. When i try to run my client i'm getting the following error

Oct 4, 2004 5:02:19 PM org.apache.catalina.startup.Catalina start
SEVERE: Catalina.start:
LifecycleException:  Protocol handler start failed: java.io.IOException: Keystore was tampered with, or password was incorrect
      at org.apache.coyote.tomcat5.CoyoteConnector.start(CoyoteConnector.java:1529)
      at org.apache.catalina.core.StandardService.start(StandardService.java:489)
      at org.apache.catalina.core.StandardServer.start(StandardServer.java:2313)
      at org.apache.catalina.startup.Catalina.start(Catalina.java:556)
      at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
      at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
      at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
      at java.lang.reflect.Method.invoke(Method.java:324)
      at org.apache.catalina.startup.Bootstrap.start(Bootstrap.java:284)
      at org.apache.catalina.startup.Bootstrap.main(Bootstrap.java:422)
Oct 4, 2004 5:02:19 PM org.apache.catalina.startup.Catalina start
INFO: Server startup in 12041 ms

I've double checked my code and the password is correct so if anyone has any ideas what else could be the problem and how to fix it  please let me know.

Thanks,
Suzy
0
Comment
Question by:fyness
3 Comments
 
LVL 6

Accepted Solution

by:
dorothy2 earned 125 total points
ID: 12219669
(1) You can use keytool to list the keys in the keystore. I can't remember whether it lists the password as one of  the attributes. I would try to independently verify the password.

(2) Unfortunately, it may take less time to blow away the keystore and recreate it and the keys than to puzzle over the error. I would recommend that you use a batch file or Java to create the keys rather than doing it interactively; that way you have a means of looking back at exactly what was entered.

Good luck,

Dorothy
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
groupSumClump challenge 9 115
Java Loop 6 62
HashTable highest marks enumeration alternative 9 39
MySQL  on Tomcat 8 46
This was posted to the Netbeans forum a Feb, 2010 and I also sent it to Verisign. Who didn't help much in my struggles to get my application signed. ------------------------- Start The idea here is to target your cell phones with the correct…
International Data Corporation (IDC) prognosticates that before the current the year gets over disbursing on IT framework products to be sent in cloud environs will be $37.1B.
Viewers learn about the third conditional statement “else if” and use it in an example program. Then additional information about conditional statements is provided, covering the topic thoroughly. Viewers learn about the third conditional statement …
This theoretical tutorial explains exceptions, reasons for exceptions, different categories of exception and exception hierarchy.

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question